New guidelines for responding to cyber attacks don’t go far enough

Padlokr –  Padlokr –  If Australia’s electricity grid was targeted by cyber attack the fall out could be severe. Shutterstock Adam Henry, UNSW and Greg Austin, UNSW Debates about cyber…

New cyber-attack model helps hackers time the next Stuxnet

Padlokr –  Padlokr –  Disabling a country’s electricity with the click of a button. usairforce Akshat Rathi, The Conversation Of the many tricks used by the world’s greatest military strategists,…

If two countries waged cyber war on each another, here’s what to expect

Padlokr –  Padlokr –  lolloj Bill Buchanan, Edinburgh Napier University Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking…

Cyber peacekeeping is integral in an era of cyberwar – here’s why

Padlokr –  Padlokr –  Shutterstock Helge Janicke, De Montfort University Cyber warfare is upon us, from interference in elections to a leak of cyber weapons from a national stockpile. And,…

Is counter-attack justified against a state-sponsored cyber attack? It’s a legal grey area

Padlokr –  Padlokr –  The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks. Parmida Rahimi/Flickr, CC BY-SA Sandeep Gopalan, Deakin University On March 23,…

Cyber spies for hire: efforts to control cyber weapons ignore the agents who use them

Padlokr –  Padlokr –  Maksim Shmeljov/Shutterstock Alexi Drew, King’s College London Reports of malicious and targeted cyber attacks are becoming increasingly common around the world. In early February, for example,…

Government cybersecurity commission calls for international cooperation, resilience and retaliation

Padlokr –  Padlokr –  Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard. U.S. Air Force photo by J.M. Eddins Jr., CC…

Cybersecurity’s next phase: Cyber-deterrence

Padlokr –  Padlokr –  Can we reduce the likelihood of digital attacks? Digital defense via shutterstock.com Dorothy Denning, Naval Postgraduate School Cyberattackers pose many threats to a wide range of…

IoT:It’s far too easy for abusers to exploit smart toys and trackers

Padlokr –  Padlokr –  JpegPhotographer/Shutterstock Saheli Datta Burton, UCL and Madeline Carr, UCL The wearable technology market is booming, with half a billion wearables sold globally in 2020. Apps on…

North Korea targeted cybersecurity researchers using a blend of hacking and espionage

Padlokr –  Padlokr –  North Korea has a long history of hacking targets in the U.S. Chris Price/Flickr, CC BY-ND Paulo Shakarian, Arizona State University North Korean hackers have staged…